An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem
DOI10.1080/00207160.2016.1274738zbMATH Open1392.94924OpenAlexW2561129690MaRDI QIDQ3174872FDOQ3174872
Rong-Jaye Chen, Yung-Hsiang Liu
Publication date: 18 July 2018
Published in: International Journal of Computer Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/00207160.2016.1274738
prime number theoremsecret sharingChinese remainder theoremasmuth-Bloom secret sharingweighted threshold secret sharing
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Distribution of primes (11N05) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- How to share a secret
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- MPFR
- On the information rate of perfect secret sharing schemes
- Threshold cryptography based on Asmuth-Bloom secret sharing
- New efficient and practical verifiable multi-secret sharing schemes
- Multipartite secret sharing by bivariate interpolation
- Characterizing Ideal Weighted Threshold Secret Sharing
- Hierarchical threshold secret sharing
- Verifiable multi-secret sharing based on LFSR sequences
- Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem
- Decentralizing Attribute-Based Encryption
- A modular approach to key safeguarding
- The complexity of the graph access structures on six participants
- How to Share a Secret
- Multilevel threshold secret sharing based on the Chinese remainder theorem
- Perfect secret sharing schemes for graph access structures on six participants
- Conjunctive Hierarchical Secret Sharing Scheme Based on MDS Codes
- Sharing DSS by the Chinese remainder theorem
Cited In (5)
- A wireless secret key generation method based on Chinese remainder theorem in FDD systems
- A collaborative secret sharing scheme based on the Chinese remainder theorem
- Title not available (Why is that?)
- Ramp scheme based on CRT for polynomial ring over finite field
- A new threshold changeable secret sharing scheme based on the Chinese remainder theorem
Uses Software
This page was built for publication: An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3174872)